City: unknown
Region: unknown
Country: IANA Special-Purpose Address
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
b
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 246.2.93.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48260
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;246.2.93.204. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400
;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 19:53:03 CST 2025
;; MSG SIZE rcvd: 105
Host 204.93.2.246.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 204.93.2.246.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 113.208.119.154 | attack | Jul 23 14:11:48 sxvn sshd[195688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.208.119.154 |
2020-07-23 20:31:49 |
| 61.95.233.61 | attack | Jul 23 13:59:23 abendstille sshd\[11038\]: Invalid user terraria from 61.95.233.61 Jul 23 13:59:23 abendstille sshd\[11038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61 Jul 23 13:59:26 abendstille sshd\[11038\]: Failed password for invalid user terraria from 61.95.233.61 port 47638 ssh2 Jul 23 14:04:10 abendstille sshd\[15717\]: Invalid user cristiano from 61.95.233.61 Jul 23 14:04:10 abendstille sshd\[15717\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61 ... |
2020-07-23 20:16:04 |
| 92.63.196.8 | attackbots | [H1.VM7] Blocked by UFW |
2020-07-23 20:26:46 |
| 186.192.198.77 | attack | Jul 23 14:03:52 ip106 sshd[19519]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.192.198.77 Jul 23 14:03:54 ip106 sshd[19519]: Failed password for invalid user michi from 186.192.198.77 port 51270 ssh2 ... |
2020-07-23 20:29:36 |
| 112.85.42.89 | attackspam | Jul 23 13:58:07 piServer sshd[9757]: Failed password for root from 112.85.42.89 port 42795 ssh2 Jul 23 13:58:11 piServer sshd[9757]: Failed password for root from 112.85.42.89 port 42795 ssh2 Jul 23 13:58:13 piServer sshd[9757]: Failed password for root from 112.85.42.89 port 42795 ssh2 ... |
2020-07-23 20:21:29 |
| 5.94.203.205 | attackbots | 2020-07-23T11:55:34.369371abusebot-7.cloudsearch.cf sshd[27861]: Invalid user boc from 5.94.203.205 port 57228 2020-07-23T11:55:34.376993abusebot-7.cloudsearch.cf sshd[27861]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-94-203-205.cust.vodafonedsl.it 2020-07-23T11:55:34.369371abusebot-7.cloudsearch.cf sshd[27861]: Invalid user boc from 5.94.203.205 port 57228 2020-07-23T11:55:36.133256abusebot-7.cloudsearch.cf sshd[27861]: Failed password for invalid user boc from 5.94.203.205 port 57228 ssh2 2020-07-23T12:03:33.686437abusebot-7.cloudsearch.cf sshd[27945]: Invalid user drr from 5.94.203.205 port 51054 2020-07-23T12:03:33.690339abusebot-7.cloudsearch.cf sshd[27945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-94-203-205.cust.vodafonedsl.it 2020-07-23T12:03:33.686437abusebot-7.cloudsearch.cf sshd[27945]: Invalid user drr from 5.94.203.205 port 51054 2020-07-23T12:03:36.084096abusebot-7.clo ... |
2020-07-23 20:45:59 |
| 117.202.8.55 | attackbotsspam | Jul 23 14:03:30 host sshd[27777]: Invalid user adm1 from 117.202.8.55 port 34608 ... |
2020-07-23 20:49:51 |
| 111.67.198.184 | attackspam | Jul 23 06:38:58 server1 sshd\[8542\]: Failed password for invalid user deploy from 111.67.198.184 port 48176 ssh2 Jul 23 06:43:21 server1 sshd\[12196\]: Invalid user superman from 111.67.198.184 Jul 23 06:43:21 server1 sshd\[12196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.67.198.184 Jul 23 06:43:24 server1 sshd\[12196\]: Failed password for invalid user superman from 111.67.198.184 port 52254 ssh2 Jul 23 06:47:50 server1 sshd\[15670\]: Invalid user 123 from 111.67.198.184 ... |
2020-07-23 20:57:04 |
| 45.5.214.216 | attack | Automatic report - Port Scan Attack |
2020-07-23 20:52:51 |
| 175.124.43.162 | attackspambots | Jul 23 13:56:51 v22019038103785759 sshd\[1655\]: Invalid user digiacomo from 175.124.43.162 port 52042 Jul 23 13:56:51 v22019038103785759 sshd\[1655\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162 Jul 23 13:56:52 v22019038103785759 sshd\[1655\]: Failed password for invalid user digiacomo from 175.124.43.162 port 52042 ssh2 Jul 23 14:03:50 v22019038103785759 sshd\[1984\]: Invalid user la from 175.124.43.162 port 60706 Jul 23 14:03:50 v22019038103785759 sshd\[1984\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.162 ... |
2020-07-23 20:32:03 |
| 95.188.120.88 | attack | 2020-07-23T14:23:09.872698ns386461 sshd\[8142\]: Invalid user yme from 95.188.120.88 port 39654 2020-07-23T14:23:09.878911ns386461 sshd\[8142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.188.120.88 2020-07-23T14:23:11.714088ns386461 sshd\[8142\]: Failed password for invalid user yme from 95.188.120.88 port 39654 ssh2 2020-07-23T14:43:50.595280ns386461 sshd\[27356\]: Invalid user andrea from 95.188.120.88 port 52938 2020-07-23T14:43:50.601594ns386461 sshd\[27356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.188.120.88 ... |
2020-07-23 20:44:18 |
| 104.229.203.202 | attackbotsspam | Jul 23 08:16:04 NPSTNNYC01T sshd[510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.229.203.202 Jul 23 08:16:06 NPSTNNYC01T sshd[510]: Failed password for invalid user dugger from 104.229.203.202 port 59214 ssh2 Jul 23 08:22:19 NPSTNNYC01T sshd[1052]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.229.203.202 ... |
2020-07-23 20:36:18 |
| 222.186.30.35 | attack | Jul 23 12:46:52 ip-172-31-61-156 sshd[15560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.35 user=root Jul 23 12:46:53 ip-172-31-61-156 sshd[15560]: Failed password for root from 222.186.30.35 port 41197 ssh2 ... |
2020-07-23 20:47:54 |
| 115.79.252.184 | attackspambots | (sshd) Failed SSH login from 115.79.252.184 (VN/Vietnam/adsl.viettel.vn): 5 in the last 3600 secs |
2020-07-23 20:39:29 |
| 192.35.168.201 | attack | Unauthorized connection attempt detected from IP address 192.35.168.201 to port 9132 |
2020-07-23 20:56:08 |